Qu et al., 2017 - Google Patents
Privacy preserving in big data sets through multiple shuffleQu et al., 2017
- Document ID
- 8403345901607246181
- Author
- Qu Y
- Xu J
- Yu S
- Publication year
- Publication venue
- Proceedings of the Australasian Computer Science Week Multiconference
External Links
Snippet
Big data privacy-preserving has attracted increasing attention of researchers in recent years. But existing models are so complicated and time-consuming that they are not easy to implement. In this paper, we propose a more feasible and efficient model for big data sets …
- 238000002474 experimental method 0 abstract description 9
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E50/00—Technologies for the production of fuel of non-fossil origin
- Y02E50/10—Biofuels
- Y02E50/16—Cellulosic bio-ethanol
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E50/00—Technologies for the production of fuel of non-fossil origin
- Y02E50/10—Biofuels
- Y02E50/17—Grain bio-ethanol
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rana et al. | Differentially private random forest with high utility | |
Song et al. | A new method of privacy protection: random k-anonymous | |
US7475085B2 (en) | Method and apparatus for privacy preserving data mining by restricting attribute choice | |
Mehta et al. | Privacy preserving big data publishing: a scalable k‐anonymization approach using MapReduce | |
Qu et al. | Big data set privacy preserving through sensitive attribute-based grouping | |
Christen et al. | Pattern-mining based cryptanalysis of Bloom filters for privacy-preserving record linkage | |
Rajalakshmi et al. | Anonymization by data relocation using sub-clustering for privacy preserving data mining | |
Matwin et al. | A review of attribute disclosure control | |
Qu et al. | Privacy preserving in big data sets through multiple shuffle | |
Shang et al. | Differential identifiability clustering algorithms for big data analysis | |
Wang et al. | On anonymizing transactions with sensitive items | |
Sun et al. | Distributed clustering in the anonymized space with local differential privacy | |
Canbay et al. | The effect of clustering on data privacy | |
Nayahi et al. | An efficient clustering for anonymizing data and protecting sensitive labels | |
Prakash et al. | Haphazard, enhanced haphazard and personalised anonymisation for privacy preserving data mining on sensitive data sources | |
Kumar et al. | Privacy-preservation of vertically partitioned electronic health record using perturbation methods | |
Mehta et al. | Toward scalable anonymization for privacy-preserving big data publishing | |
Yadav et al. | Privacy preserving data mining with abridge time using vertical partition decision tree | |
Raj et al. | Big data anonymization in cloud using k-anonymity algorithm using map reduce framework | |
Usha et al. | Sensitive attribute based non-homogeneous anonymization for privacy preserving data mining | |
Gachanga et al. | Feature based data anonymization with slicing method for data publishing | |
Wang et al. | Extending suppression for anonymization on set-valued data | |
Jeba et al. | Classifying and evaluating privacy-preserving techniques based on protection methods: A comprehensive study | |
Razaque et al. | Analytical evaluation of k–anonymity algorithm and epsilon-differential privacy mechanism in cloud computing environment | |
Peng et al. | Differential attribute desensitization system for personal information protection |